Cargando…
Characterization of the Ability of Low-Cost GNSS Receiver to Detect Spoofing Using Clock Bias
The aim of this paper was to propose a method to characterize the ability of a GNSS user to detect a spoofing attack from the behavior of the clock bias. Spoofing interference is not a new issue, especially in military GNSS, although it is a new challenge for civil GNSS, since it is currently implem...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10007427/ https://www.ncbi.nlm.nih.gov/pubmed/36904938 http://dx.doi.org/10.3390/s23052735 |
_version_ | 1784905518556381184 |
---|---|
author | Truong, Victor Vervisch-Picois, Alexandre Rubio Hernan, Jose Samama, Nel |
author_facet | Truong, Victor Vervisch-Picois, Alexandre Rubio Hernan, Jose Samama, Nel |
author_sort | Truong, Victor |
collection | PubMed |
description | The aim of this paper was to propose a method to characterize the ability of a GNSS user to detect a spoofing attack from the behavior of the clock bias. Spoofing interference is not a new issue, especially in military GNSS, although it is a new challenge for civil GNSS, since it is currently implemented and used in many everyday applications. For this reason, it is still a topical issue, especially for receivers that only have access to high-level data (PVT,CN0). To address this important issue, after conducting a study of the receiver clock polarization calculation process, this led to the development of a very basic Matlab model that emulates a spoofing attack at the computational level. Using this model, we were able to observe that the clock bias is affected by the attack. However, the amplitude of this disturbance depends on two factors: the distance between the spoofer and the target and the synchronization between the clock that generates the spoofing signal and the reference clock of the constellation. To validate this observation, more or less synchronized spoofing attacks were carried out on a fixed commercial GNSS receiver with the use of GNSS signal simulators and also with a moving target. We propose then a method to characterize the capacity of detecting a spoofing attack with the clock bias behavior. We present the application of this method for two commercial receivers of the same manufacturer from different generations. |
format | Online Article Text |
id | pubmed-10007427 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-100074272023-03-12 Characterization of the Ability of Low-Cost GNSS Receiver to Detect Spoofing Using Clock Bias Truong, Victor Vervisch-Picois, Alexandre Rubio Hernan, Jose Samama, Nel Sensors (Basel) Article The aim of this paper was to propose a method to characterize the ability of a GNSS user to detect a spoofing attack from the behavior of the clock bias. Spoofing interference is not a new issue, especially in military GNSS, although it is a new challenge for civil GNSS, since it is currently implemented and used in many everyday applications. For this reason, it is still a topical issue, especially for receivers that only have access to high-level data (PVT,CN0). To address this important issue, after conducting a study of the receiver clock polarization calculation process, this led to the development of a very basic Matlab model that emulates a spoofing attack at the computational level. Using this model, we were able to observe that the clock bias is affected by the attack. However, the amplitude of this disturbance depends on two factors: the distance between the spoofer and the target and the synchronization between the clock that generates the spoofing signal and the reference clock of the constellation. To validate this observation, more or less synchronized spoofing attacks were carried out on a fixed commercial GNSS receiver with the use of GNSS signal simulators and also with a moving target. We propose then a method to characterize the capacity of detecting a spoofing attack with the clock bias behavior. We present the application of this method for two commercial receivers of the same manufacturer from different generations. MDPI 2023-03-02 /pmc/articles/PMC10007427/ /pubmed/36904938 http://dx.doi.org/10.3390/s23052735 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Truong, Victor Vervisch-Picois, Alexandre Rubio Hernan, Jose Samama, Nel Characterization of the Ability of Low-Cost GNSS Receiver to Detect Spoofing Using Clock Bias |
title | Characterization of the Ability of Low-Cost GNSS Receiver to Detect Spoofing Using Clock Bias |
title_full | Characterization of the Ability of Low-Cost GNSS Receiver to Detect Spoofing Using Clock Bias |
title_fullStr | Characterization of the Ability of Low-Cost GNSS Receiver to Detect Spoofing Using Clock Bias |
title_full_unstemmed | Characterization of the Ability of Low-Cost GNSS Receiver to Detect Spoofing Using Clock Bias |
title_short | Characterization of the Ability of Low-Cost GNSS Receiver to Detect Spoofing Using Clock Bias |
title_sort | characterization of the ability of low-cost gnss receiver to detect spoofing using clock bias |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10007427/ https://www.ncbi.nlm.nih.gov/pubmed/36904938 http://dx.doi.org/10.3390/s23052735 |
work_keys_str_mv | AT truongvictor characterizationoftheabilityoflowcostgnssreceivertodetectspoofingusingclockbias AT vervischpicoisalexandre characterizationoftheabilityoflowcostgnssreceivertodetectspoofingusingclockbias AT rubiohernanjose characterizationoftheabilityoflowcostgnssreceivertodetectspoofingusingclockbias AT samamanel characterizationoftheabilityoflowcostgnssreceivertodetectspoofingusingclockbias |